{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:45:52Z","timestamp":1725576352365},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,30]],"date-time":"2021-01-30T00:00:00Z","timestamp":1611964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,30]],"date-time":"2021-01-30T00:00:00Z","timestamp":1611964800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,30]],"date-time":"2021-01-30T00:00:00Z","timestamp":1611964800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100007225","name":"Ministry of Science and Technology (MOST)","doi-asserted-by":"publisher","award":["107-2221-E-009-024-MY2"],"award-info":[{"award-number":["107-2221-E-009-024-MY2"]}],"id":[{"id":"10.13039\/100007225","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001838","name":"Ministry of Economic Affairs (MOEA)","doi-asserted-by":"publisher","award":["l06-EC-17-A-24-0619"],"award-info":[{"award-number":["l06-EC-17-A-24-0619"]}],"id":[{"id":"10.13039\/501100001838","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,30]]},"DOI":"10.1109\/dsc49826.2021.9346264","type":"proceedings-article","created":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T18:53:45Z","timestamp":1618253625000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["A Black-Box Adversarial Attack via Deep Reinforcement Learning on the Feature Space"],"prefix":"10.1109","author":[{"given":"Lyue","family":"Li","sequence":"first","affiliation":[{"name":"National Chiao Tung University,Computer Science Department,Hsinchu,Taiwan,30050"}]},{"given":"Amir","family":"Rezapour","sequence":"additional","affiliation":[{"name":"National Chiao Tung University,Computer Science Department,Hsinchu,Taiwan,30050"}]},{"given":"Wen-Guey","family":"Tzeng","sequence":"additional","affiliation":[{"name":"National Chiao Tung University,Computer Science Department,Hsinchu,Taiwan,30050"}]}],"member":"263","reference":[{"key":"ref10","first-page":"1652","article-title":"Towards imperceptible and robust adversarial example attacks against neural networks","author":"luo","year":"2018","journal-title":"Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref14","article-title":"Defense-GAN: Protecting classifiers against adversarial attacks using generative models","author":"samangouei","year":"2018","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref15","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"arXiv preprint arXiv 1312 6199"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/543"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref6","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/app9112286"},{"key":"ref8","article-title":"Adver-sarial examples in the physical world","author":"kurakin","year":"2016","journal-title":"arXiv preprint arXiv 1607 02533"},{"key":"ref7","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3321707.3321749"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"}],"event":{"name":"2021 IEEE Conference on Dependable and Secure Computing (DSC)","start":{"date-parts":[[2021,1,30]]},"location":"Aizuwakamatsu, Fukushima, Japan","end":{"date-parts":[[2021,2,2]]}},"container-title":["2021 IEEE Conference on Dependable and Secure Computing (DSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9346211\/9346228\/09346264.pdf?arnumber=9346264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:40:16Z","timestamp":1652182816000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9346264\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,30]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/dsc49826.2021.9346264","relation":{},"subject":[],"published":{"date-parts":[[2021,1,30]]}}}